ABSTRACT: This paper explores the privacy security issues and countermeasures of artificial intelligence (hereinafter referred to as AI) technology application. The aim of this exploration is to better leverage AI technology to enhance work efficiency and benefits, as well as enrich personal lives. In research, AI technology has been widely applied with remarkable effects, demonstrating its advantages in the areas of personalised content recommendation and precise advertising placement, amongst others. Nevertheless, it is imperative to acknowledge the inherent security risks associated with the implementation of AI technology. In order to address these issues in a scientific and effective manner, it is essential for users to be cognizant of the risks and significant harms associated with personal privacy breaches. In addition, it is imperative to understand the processes of data collection, storage, and application by media platforms. (Crawford, 2021) Users should also play an active role in enhancing personal privacy security in accordance with laws and regulations, leveraging technological solutions to ensure the efficiency, reliability, and security of AI technology applications.
Keywords: AI Technology; Privacy Security; Countermeasures
In the contemporary era, characterised by accelerated advancements in information technology, the merits of big data have become increasingly evident. Concurrently, artificial intelligence (AI) technology has permeated myriad facets of our lives, exerting a profound influence on public perception and development. This paper explores the current application status of AI technology in media platforms and the hidden security risks in its application. It also aims to understand the functions and services of AI technology in media platforms and to conduct targeted research on user privacy security issues in AI technology application. The overarching objective is to effectively resolve these issues and improve the promotion efficiency and application benefits of AI. (Crawford, 2021)

Redbook, a social software platform, has been at the forefront of leveraging AI data in the digital transformation era. Utilising sophisticated AI algorithms, Redbook is capable of accurately analysing user behaviour, thereby customising the content presented to each user and significantly enhancing their interactive experience. However, the recent closure of TikTok in certain regions has unexpectedly resulted in a significant influx of foreign users to Redbook, with these new users exhibiting diverse cultural backgrounds and usage habits. This has presented novel challenges to Redbook’s community ecology.
I. Current Application Status of AI Technology in Media Platforms
The development of AI technology has led to its increased application, with the technology gaining recognition and support from the public. The implementation of AI in content recommendation, intelligent advertising placement, and other domains has capitalised on the benefits offered by big data, yet concomitantly raised concerns regarding personal privacy.
In order to address these challenges and enhance the user experience, Redbook has swiftly implemented a range of sophisticated AI data analysis tools. These tools are capable of monitoring user behaviour in real time, analysing user preferences, and predicting user trends, thereby providing substantial data support for Little Red Book’s content recommendation, community management, and business cooperation. However, concerns regarding information security persist. (Dijck, 2018)
Firstly, the capacity of AI technology to recommend personalised content to individuals on the basis of their browsing and search histories, as well as their expressed preferences and comments, has the potential to enhance the user experience of software applications. However, the smart recommendation of AI also increases the risk of personal privacy and security. The aggregation of data may result in the disclosure of sensitive information such as occupation and familial status. (Pasquale, 2015) To illustrate this point, consider a scenario in which an AI-powered system recommends content to a user based on their academic progress, such as college applications and admission scores, in response to the user having a student at home preparing for exams. This concentrated data may then be utilised by college preparation classes and tutoring centres to ascertain user needs, thus prompting the collection of more detailed user information and profiles. This, in turn, has the potential to impact personal privacy and security.
Secondly, AI technology facilitates the accurate delivery of advertisements, utilising information such as age, gender, region and interests of users. This enhances the effectiveness of advertising and reduces costs. However, there are concerns regarding ad tracking and privacy leakage. For instance, the use of AI technology in Redbook to target pharmaceutical advertisements could potentially lead to tracking based on big data analysis suggesting a user has a relevant health condition.
Thirdly, AI technology has the ability to automatically collect, organise, and analyse vast quantities of data to generate text articles. In some cases, it can even simulate the writing style of certain authors. The application of AI technology facilitates news writing, publicity copywriting and other related activities. However, there is also a risk of user privacy breaches. A notable incident involving the AI tool “DianDian” on Little Red Book, where it was revealed that it directly utilised the content of Red Book users as an AI corpus, underscores this concern. This incident underscores the potential risks associated with the application of AI technology to content creation and analysis.

In summary, AI technology, supported by big data, is increasingly being applied across a wide range of business areas, playing a significant role in content recommendation, advertising placement, and writing. It improves the efficiency of personal information search and acquisition, enhances the precision of advertising placement, and increases writing speed and effectiveness. However, as AI technology deeply mines user behaviour data, various platforms provide customers with precise services while also increasing the risk of personal privacy security. The leakage of personal information will have severe impacts and damage on users. For instance, the unauthorised disclosure of information pertaining to parents of high school seniors could result in unsolicited calls from tutoring centres and institutions of higher learning. The leakage of user disease information may cause reputational damage, physical health damage, and other harms. Therefore, when considering and studying the application of AI technology, it is essential to prioritise security and protection of personal privacy.

II. AI Technology Application and Privacy Security
Computer network security issues have received sufficient attention, and AI technology application security issues have equally garnered attention and research. Currently, the security issues of AI technology application mainly stem from data collection and misuse, as well as the lack of user control. (Solum, 2009)
First, the collection and use of user data by selfmedia platforms is covert, and users are unaware of the collection and use of their personal information, resulting in a lack of awareness and ability to prevent the leakage of personal information, and significant privacy and security risks. If the self-media platform sells user information and data to a third party, the user’s privacy will be seriously violated.
Second, in the application of AI technology, users lack control over the collection, storage, use of personal information and data and their flow. Users are at a disadvantage and passive position in terms of personal privacy security protection. This out-of-control state of personal information and data increases users’ concern about privacy and security issues and reduces their trust in media platforms. For example, on Douban AI, a WeChat ID can be easily obtained by simply typing in the name and school. personal information can be easily retrieved and accessed, triggering concerns about personal privacy security.
Third, data leakage and hacking attacks have always been a major concern for cybersecurity. During the development of AI technology, data leakage and hacking attacks remain important factors that exacerbate the risk of personal privacy security. On the one hand, users’ indifference to personal privacy security has led to the leakage of information such as personal ID numbers and account numbers, and personal information and data are vulnerable to theft and abuse. For example, Chinese police uncovered a case in which Redbook used artificial intelligence technology to forge live videos, bypass the login authentication of some online platforms, and forcibly log in to other people’s accounts to steal users’ information. Account leakage and AI forgery technology are key factors leading to user losses. On the other hand, hacking is an important reason for the leakage of users’ personal privacy in the application of AI technology. Hackers use technical means to crack user accounts and secrets and break through the security protection of media platforms to obtain database information, leading to the leakage of user privacy. In summary, the application of AI technology has advanced technological development and improved the efficiency and benefits of AI application, but it also exposes users to personal privacy security risks. Moreover, as AI technology continues to develop and the amount of data increases, personal privacy security risks will continue to increase. Once personal accounts and secrets are leaked, or if media platform security measures are inadequate or user data is stolen and abused by hackers, personal privacy breaches will pose severe security risks and losses to users.
III. Countermeasures and Suggestions for Potential Privacy Security Risks in AI Technology Application
Secondly, it is essential to enhance users’ control and awareness of their personal information. Customers should be able to clearly understand the collection, storage, application, and flow of their personal information in AI technology applications, and have decision-making power and awareness regarding the flow and application of their personal privacy. Optimise the relationship between users and media platforms, increase users’ trust in media platforms, protect personal privacy in accordance with laws and regulations and relying on technology, and reduce and eliminate user privacy security risks.
Thirdly, enhance users’ security awareness and use technology to address AI technology application security risks. On the one hand, raise personal awareness of security risks in media platform usage. Through media promotion, advertising, and other means, raise individuals’ awareness of privacy security risks, emphasise the importance of personal privacy security, encourage the use of passwords when using AI, ensure regular password changes, and advise against the disclosure of personal information casually. Furthermore, it is crucial to employ legal measures to counteract behaviours that infringe upon personal privacy, thereby safeguarding personal rights and interests. In addition, the adoption of advanced encryption technology and security protection measures is crucial in preventing hacker attacks and safeguarding personal information and data from theft, thereby ensuring comprehensive personal privacy security.
Secondly, enhance users’ control and awareness of their personal information. Customers should be able to clearly understand the collection, storage, application, and flow of their personal information in AI technology application, and have decision-making power and awareness regarding the flow and application of their personal privacy. Optimize the relationship between users and media platforms, increase users’ trust in media platforms, protect personal privacy in accordance with laws and regulations and relying on technology, and reduce and eliminate user privacy security risks.
Thirdly, enhance users’ security awareness and use technology to address AI technology application security risks. On the one hand, raise personal awareness of security risks in media platform usage. Through media promotion, advertising, and other means, increase individuals’ awareness of privacy security risks, strengthen their emphasis on personal privacy security, set passwords when using AI, change passwords regularly, and do not disclose personal information casually. Legally counteract behaviors that infringe upon personal privacy and protect personal rights and interests. On the other hand, adopt advanced encryption technology, security protection technology, etc., to prevent hacker attacks and protect personal information and data from being stolen, ensuring personal privacy security.
Conclusion
The application of AI technology in media platforms has brought unprecedented opportunities for information dissemination and media development, but it is also accompanied by challenges related to privacy issues. Objectively recognize the risks associated with AI technology application, carefully analyze and study personal privacy security issues in AI technology application, adopt corresponding countermeasures and methods to protect personal privacy and maintain network security. At the same time, pay attention to the development of AI technology and changes in privacy security risks. Prioritize personal privacy security ideologically, then explore strategies and methods to address personal privacy security from details and technology, continuously explore the advantages and benefits of AI technology application, and reduce, avoid, or eliminate the security risks associated with AI technology application, so that AI technology can better serve human society.
References
Crawford, K. (2021). The Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence. Yale University Press.
Dijck, J. van. (2018). The platform society (T. Poell & M. de Waal, Eds.). Oxford University Press.
Pasquale, F. (2015). The black box society : the secret algorithms that control money and information . Harvard University Press.
Solum, L. B. (2009). Models of Internet governance. In Internet Governance : Infrastructure and Institutions. https://doi.org/10.1093/acprof:oso/9780199561131.003.0003
Zhang, Y. Y. (2025). Research on AI governance for security risks in the full life cycle of archival data. Zhejiang Archives, (02), 38.
Be the first to comment